Exam4Training

The attacker intercepts and records the data from A to B, and then extracts the information from the data intercepted earlier to B, what is the process called?

The attacker intercepts and records the data from A to B, and then extracts the information from the data intercepted earlier to B, what is the process called?
A . Man-in-the-middle attack
B . Password guesser and dictionary attack
C . Reflection attack
D . Replay attack

Answer: D

Exit mobile version